General

  • Target

    mal.zip

  • Size

    749KB

  • Sample

    220906-p7317adbh4

  • MD5

    51e169f506279333e61b92b046a7d261

  • SHA1

    dbf28ccaa1e3b3dddb60bdcca7394f0eadc6dd56

  • SHA256

    6afd66a8052fcc6f5058b53fd7c57cb37d2e05633a7cc9f073a7039d45d98cd5

  • SHA512

    424924ccd46b130f48d0055624ada5334912deb799dafbb322799eebc15e1a1b1d79a7345699f7eede3404ac336018cf66fed77acf2b9a0f889f80fa59aca760

  • SSDEEP

    12288:tm+YfJ9BD4mfShqgTKpyiKy1MST2osx5p3DUyEqq6Ony8ZuJisnK40YGoHzXE03w:EpJ9BRfShiQW1tKosnYyEeHJisnGtQXU

Malware Config

Extracted

Family

warzonerat

C2

www.warkarwaka.duckdns.org:6454

Targets

    • Target

      meaterialorders.exe

    • Size

      996KB

    • MD5

      fc9a563b2c81a36b5faa6832695d59ef

    • SHA1

      1f49d88c095ac07bacc27b2de94affb5b4246611

    • SHA256

      a6c334e0bf23b3228bd86b455ee16a5f9675ac453f8e5ab0de66ab8824cecaa0

    • SHA512

      3c5dd0db3d35ef54ff641356ded4248806a0a7c83cd0c99518ffc2551a7fb6db09f95f4d5176db7af5344f9cada6c602ab1994d947c68a649c816e9c447a596a

    • SSDEEP

      24576:adNH1IqAS7ydN41p5Mtzqonte45WxGUSJw/BA0Uk5Wfw:aTvAHMhmZnk4wV/BJUk5WY

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks